Dapr, the distributed application runtime, is close to leaving the Cloud Native Computing Foundation’s incubation program. Regular updates have refined existing features and added new capabilities.
Many businesses embrace software-as-a-service (SaaS) or commercial off-the-shelf (COTS) applications to modernize business capabilities and replace aging core applications and systems of record. While ...
While the rise of cloud-native architecture and applications can't be understated, the industry still needs to evolve by reducing the complexity associated with the technology's benefits, according to ...
Earlier this year, the Cloud Native Computing Foundation (CNCF) highlighted five trends shaping the future of cloud computing: AI-as-a-service, hybrid and multicloud strategies, AI at the edge ...
Simply running an application on a remote server doesn’t make it cloud-native. It’s about specific design principles for scalability and resilience. Cloud-native applications are increasingly the ...
The themes of cloud innovation and artificial intelligence-driven transformation headlined the recent Red Hat Summit. As companies scale and entrench themselves into digital operations, cloud-native ...
If you did away with Linux, the cloud, containers, or Kubernetes, you wouldn't recognize today's technology world. Linux is the operating system foundation for all of it; the cloud gives us access to ...
CNCF and SlashData release the Q1 2026 State of Cloud Native Development report, analyzing trends across more than 12,500 global developers. The global cloud native developer community has grown to 19 ...
"Our most important focus areas are cloud-native and intelligent app development," said Microsoft in outlining its vision for .NET 9, which this month shipped in its first preview ahead of reaching ...
The latest trends and issues around the use of open source software in the enterprise. The great and the good among the (widely open source) cloud-native community gathered together this week for ...
The news headlines are full of breaches and data exposures that are the result of unsecured cloud-native applications and application programming interfaces (APIs) — how, for example, third-party data ...